Closed ghost closed 4 years ago
Thanks for the feedback! We are routing this to the appropriate team for follow-up. cc @antcp, @AzureAppServiceCLI.
Thanks for reporting. I include WebApp team to look into this issue.
We are also experiencing the same issue when within the same subscription but different resource groups
@hihorika we currently don't support this command across subscriptions.
@madsd just wanted to check if this command supports accessing VNets across subscription by passing a VnetId?
@panchagnula @hihorika I should work cross subscription, however you will not be able to verify that Service Endpoint is enabled for the specified Subnet across subscriptions and you will need to run the command with "-IgnoreMissingServiceEndpoint"
Thank you for the quick response @madsd @hihorika please try the suggestion offered , and we will make sure to update our documentation with examples for this scenario.
I confirmed that this command works with -IgnoreMissingServiceEndpoint
option.
Could you please write this behavior into a documentation if this is a known limitation?
Thanks for confirming we will work on updating documentation.
Description
Executing
Add-AzWebAppAccessRestrictionRule
with subnet in other subscription as value of-SubnetId
, powershell tries to find the resource group of the subnet in a subscription which Web App belongs in, then it is failed.Steps to reproduce
Environment data
Module versions
This is reproducable on Cloud Shell.
Debug output
Error output